|
----- Original Message ----- From: "Conectiva Updates" <secure@conectiva.com.br> To: <conectiva-updates@papaleguas.conectiva.com.br>; <lwn@lwn.net>; <bugtraq@securityfocus.com>; <security-alerts@linuxsecurity.com>; <linsec@lists.seifried.org> Sent: Wednesday, April 30, 2003 9:49 AM Subject: [CLA-2003:632] Conectiva Security Announcement - apache > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > - ------------------------------------------------------------------------ -- > CONECTIVA LINUX SECURITY ANNOUNCEMENT > - ------------------------------------------------------------------------ -- > > PACKAGE : apache > SUMMARY : Denial of service vulnerability > DATE : 2003-04-30 14:48:00 > ID : CLA-2003:632 > RELEVANT > RELEASES : 9 > > - ------------------------------------------------------------------------ - > > DESCRIPTION > Apache[1] is the most popular webserver in use today. > > This update fixes two security vulnerabilities: > > 1. Denial of service (CAN-2003-0132)[3] > David Endler from iDefense reported[2] a denial of service condition > that affects the apache 2.0 branch which affects all unpatched > servers up to and including version 2.0.44. > > There is a memory leak in these apache versions which can be remotely > triggered by sending large chunks of consecutive linefeed characters. > Each linefeed will cause the server to allocate 80 bytes of memory. > > A remote attacker can keep sending these simple requests until the > server's memory is exhausted. > > 2. File descriptor leak[5] > Christian Kratzer and Bjoern A. Zeeb identified several file > descriptor leaks to child processes, such as CGI scripts, which could > consitute a security threat on servers that run untrusted CGI > scripts. > > The Apache HTTP Server Project released[4] Apache version 2.0.45 to > address these issues, and this is the version provided via this > update. > > > SOLUTION > It is recommended that all Apache users upgrade their packages. > > IMPORTANT: it is necessary to manually restart the httpd server after > upgrading the packages. In order to do this, execute the following as > root: > > service apache stop > > (wait a few seconds and check with "ps ax|grep httpd" if there are > any httpd processes running. On a busy webserver this could take a > little longer) > > service apache start > > > REFERENCES > 1. http://httpd.apache.org/ > 2. http://www.idefense.com/advisory/04.08.03.txt > 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132 > 4. http://www.apache.org/dist/httpd/Announcement2.html > 5. http://nagoya.apache.org/bugzilla/show_bug.cgi?id=17206 > > > UPDATED PACKAGES > ftp://atualizacoes.conectiva.com.br/9/SRPMS/apache-2.0.45-28790U90_1cl.src.r pm > ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-2.0.45-28790U90_1cl.i386.r pm > ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-devel-2.0.45-28790U90_1cl. i386.rpm > ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-doc-2.0.45-28790U90_1cl.i3 86.rpm > ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-htpasswd-2.0.45-28790U90_1 cl.i386.rpm > ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-2.0.45-28790U90_1cl. i386.rpm > ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-static-2.0.45-28790U 90_1cl.i386.rpm > ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr0-2.0.45-28790U90_1cl.i386. rpm > > > ADDITIONAL INSTRUCTIONS > The apt tool can be used to perform RPM packages upgrades: > > - run: apt-get update > - after that, execute: apt-get upgrade > > Detailed instructions reagarding the use of apt and upgrade examples > can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en > > - ------------------------------------------------------------------------ - > All packages are signed with Conectiva's GPG key. The key and instructions > on how to import it can be found at > http://distro.conectiva.com.br/seguranca/chave/?idioma=en > Instructions on how to check the signatures of the RPM packages can be > found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en > > - ------------------------------------------------------------------------ - > All our advisories and generic update instructions can be viewed at > http://distro.conectiva.com.br/atualizacoes/?idioma=en > > - ------------------------------------------------------------------------ - > Copyright (c) 2003 Conectiva Inc. > http://www.conectiva.com > > - ------------------------------------------------------------------------ - > subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br > unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.0.6 (GNU/Linux) > Comment: For info see http://www.gnupg.org > > iD8DBQE+sAyO42jd0JmAcZARAoRzAJ4/YiZhEH/a5PKSls5bXKbPDI0bSwCdFjWO > yLHZiBj+wWOkv+2DLxpHjHI= > =AIKW > -----END PGP SIGNATURE----- >